skip navigation

More signal. Less noise.

Daily briefing.

Hans-Georg Maassen, head of the Bundesamt für Verfassungsschutz, adds his voice to warnings of potential Russian interference in German elections. In the US, NSA Director Admiral Rogers says that an unnamed state (but they're all looking at you, Russia) made "a conscious effort" to affect the recent US elections via WikiLeaks. Mother Jones wants Congress to investigate (and they sound surprisingly more like Mr. Deeds than they do their eponymous Wobbly).

A Passcode op-ed argues that the US elections' big lesson is that everyone (especially politicians and their staffs) needs to do cyber security better. Foreign Policy observes that repressive regimes have found ways of turning social media to unfortunate advantage—Twitter's rise as the daystar in the false dawn of Iran's Green Revolution now seems like ancient history.

Huawei and ZTE scramble to reassure customers about the Adup backdoor Kryptowire researchers found in too many phones.

Enigma Software predicts a holiday cybercrime spike, and others, including Core Security and Skycure, offer advice on staying safe while shopping. (Skycure's even got a run-down on the riskiest mall Wi-Fi systems.)

Recorded Future peers into the mind of the cybercriminal. Readers of Freakonomics and watchers of Donnie Brasco won't be surprised to learn that low-level cyberhoods lack skills and don't make much.

In the UK, the Snooper's Charter passes the Lords.

Because the Russian government cares as much about personal privacy as it does about combinations in restraint of trade, a Russian court has ruled that the countries ISPs must block LinkedIn.

Notes.

Today's issue includes events affecting Australia, China, Germany, Russia, United Kingdom, United States.

The CyberWire's regular daily Podcast will be out later this afternoon, with interviews, educational tips, and more on the stories of the day. Today we hear from our partners at the Ben-Gurion University of the Negev, as USB maven Ran Yahalom talks about the latest in this kind of hardware attack. And our guest, John LaCour, CEO of Phishlabs, will talk us through the ever-dangerous landscape of phishing attacks. If you enjoy the podcast, please consider giving it an iTunes review.

AlienVault USM Webcast (Live Webcast, December 1, 2016) Find threats lurking on your systems with host-based intrusion detection and AlienVault USM.

Cyber Attacks, Threats, and Vulnerabilities

Germany alarmed about potential Russian interference in election: spy chief (Reuters) Germany is alarmed that Russia may seek to interfere in its national elections next year, the domestic intelligence chief said, echoing concerns raised in the United States before Donald Trump's presidential election victory

NSA CHIEF: A nation-state made a 'conscious effort' to sway the US presidential election (Business Insider) The leader of the National Security Agency says there shouldn't be "any doubt in anybody's mind" that there was "a conscious effort by a nation-state" to sway the result of the 2016 presidential election

NSA chief: WikiLeaks US election disclosures were 'conscious effort by a nation-state' (International Business Times) The email leaks were 'not something that was done casually', suggests head of National Security Agency

The NSA Chief Says Russia Hacked the 2016 Election. Congress Must Investigate. (Mother Jones) It's up to Capitol Hill to protect American democracy

Alphabet's Eric Schmidt says Russia is the biggest cyber attack threat to the US (BusinessInsider) Eric Schmidt, the executive chairman of Google's parent company Alphabet, says he's worried about Russian cyber attacks against the US more than any other country

Opinion: The election's hard cybersecurity lesson (Christian Science Monitor Passcode) While politicians, pollsters, and the public will look for lessons in this historic presidential election, one of the biggest takeaways is everyone needs to do a better job when it comes to protecting their data

Hillary Clinton Supporters Doxxing, Harassing Electoral College Voters (Heatstreet) Supporters of Democratic presidential candidate Hillary Clinton have already gotten more than 4 million signatures on a petition asking the Electoral College to toss Donald Trump’s victory. But some, apparently, aren’t content to simply vent their frustrations online

How Social Media Helps Dictators (Foreign Policy) It's been hailed as "liberation technology." But it has a darker side

Chinese IoT Firm Siphoned Text Messages, Call Records (KrebsOnSecurity) A Chinese technology firm has been siphoning text messages and call records from cheap Android-based mobile smart phones and secretly sending the data to servers in China, researchers revealed this week

Shanghai surprise as cheap Android devices ‘phone home’ to China (Naked Security) If your business is a BYOD outfit, it might already have rock-solid rules to keep the network safe from lame passwords, dodgy apps, rooted phones, devices too old to get security updates (even if they’re brand new), unlocked screens, and the USB-stick-like ability to slather around malware

”New phone, who dis?” Huawei, ZTE respond to reports of secret back door in Android devices (Fast Company) In the wake of a New York Times report yesterday that millions of Android-based smart devices may contain a bug that sent consumers' private data to Chinese servers, Huawei and ZTE—two of the world's largest phone makers, which are based in Shenzhen, China, and who were also fingered as clients of the software developer, Shanghai Adups Technology Company—are hoping to tamp down concerns that their products were compromised. Since news broke of the "backdoor," fans and customers of both companies have scrambled to message boards looking for answers

Once again, Siri helps attackers bypass your iPhone’s passcode (Hot for Security) Over the years iPhones and iPads have been plagued on many occasions by passcode bypasses – a secret method that allows an attacker to unlock your iOS device and access your private data

Researchers identify domain-level service credential exploit (Help Net Security) CyberArk Labs unveiled new research detailing what it considers to be a significant risk across all Windows endpoints, including those on Windows 10 with Credential Guard enabled. The exploit could allow cyber attackers to harvest encrypted service credentials from the registry and inject them into a new malicious service to achieve lateral movement and full domain compromise

Example of Getting Analysts & Researchers Away (SANS Internet Storm Center) It is well-known that bad guys implement pieces of code to defeat security analysts and researchers. Modern malware's have VM evasion techniques to detect as soon as possible if they are executed in a sandbox environment. The same applies for web services like phishing pages or C&C control panels

Fake executive social media accounts threaten enterprises (Help Net Security) New research has uncovered numerous duplicative Twitter and LinkedIn accounts among Fortune 500 leaders, raising concerns about potential security vulnerabilities

SWIFT has not seen its last 'bank robbery' (CSO) Hackers continue to penetrate SWIFT's messaging system

Report: Surveillance cameras most dangerous IoT devices in enterprise (CSO) Networked security cameras are the most likely to have vulnerabilities

Is critical infrastructure the next DDoS target? (CSO) A massive Distributed Denial of Service attack shut down a portion of the internet recently. Experts say it is unlikely a similar attack could take down the grid or other critical infrastructure but acknowledge that security remains weak in the industry

Prepare for the Worst, Hope for the Best (Akamai Blogs) Leading up to the U.S Presidential Election last week, the oracles of the security world were warning of all the possible types of attacks we might see during the day of decision making. We were preparing for attacks against voting machines, disinformation spread through social media platforms, more email leaks, and above all Distributed Denial of Service (DDoS) attacks against everyone from the White House to news sites around the globe. Yet none of these seem to have materialized

Ransoc Desktop Locker Ransomware Scans Social Media Profiles for Exploitation (HackRead) Researchers have identified a new scheme of ransomware called Ransoc. It is a new type of desktop locking malware that gets activated after it discovers evidence of media files downloaded via torrents or child pornography links on the targeted computer

Wickedly Clever USB Stick Installs a Backdoor on Locked PCs (Wired) You probably know by now that plugging a random USB into your PC is the digital equivalent of swallowing a pill handed to you by a stranger on the New York subway

Cisco Unified Communications Manager Web Interface Cross-Site Scripting Vulnerability (Cisco) A vulnerability in several parameters of the ccmivr page of Cisco Unified Communication Manager (CallManager) could allow an unauthenticated, remote attacker to launch a cross-site scripting (XSS) attack against a user of the web interface on the affected system

AppRiver warns on security threat from games (Mobile World Live) Many top games on Google’s Play Store, with millions of global downloads, want permission for full network access and this can be a major security hazard, warned software security specialist AppRiver

Skycure Mobile Shopping Advisory Reveals Riskiest Shopping Malls for Mobile Devices (Marketwired) Fashion Show Mall in Las Vegas tops list of malls with most malicious Wi-Fi networks; report also warns of malicious shopping-related apps

Attention: Holiday Shopping May Be Hazardous To Your Mobile Device (Skycure) The 2016 holiday shopping season may be the most dangerous of all – to your smartphone

Malware Infections Expected to Spike During 2016 Holiday Shopping Season (Enigma Software) As millions of Americans prepare to spend billions of dollars in online holiday shopping, malware makers are gearing up for a big couple months as well. November and December are typically very busy months for malware infections on computers, and an increase in online holiday shopping is most likely to blame

Jingle Bells, Retail Sells, Attacks are on the Way (Part 2) (Core Security Blog) It’s that time of year where retail booms as the world goes shopping for gifts during the holiday season. It’s the time for retailers to shine. It’s also the time where retailers are most vulnerable to security risks as bad actors gear up to target retailers

Inside the Mind of Cyber Criminals (Recorded Future) To learn more about how cyber criminals operate in the dark web, we asked our own Andrei Barysevich a few questions. Below is what he had to say

NHS Cybersecurity: Breaches Up, Spending Low (Infosecurity Magazine) A new Freedom of Information (FoI) request has uncovered a litany of cybersecurity failings by NHS trusts across the UK

Security Patches, Mitigations, and Software Updates

SHA-1 Time Bomb: One Third of Websites Have Yet to Upgrade (Infosecurity Magazine) Over a third (35%) of the world’s websites are still using insecure SHA-1 certificates despite the major browser vendors saying they’ll no longer trust such sites from early next year, according to Venafi

WhatsApp tightens user privacy with encrypted video calls (Naked Security) Not that long ago, encryption was a technology that only techies and the paranoid worried about

Mozilla Patches 29 Vulnerabilities, Prevents MIME Confusion Attacks, in Firefox 50 (Threatpost) Mozilla addressed 29 vulnerabilities, three rated critical, when it released the latest iteration of its flagship browser, Firefox 50 and Firefox ESR 45.5, on Tuesday

Cyber Trends

Cyber attack readiness is falling – major global study reveals (Computer Business Review) Ponemon and IBM show worrying trend as cyber resilience is marked down since 2015

Cyber risk in advanced manufacturing: How to be secure and resilient (Help Net Security) Nearly half of surveyed manufacturing executives lack confidence their assets are protected from external threats, according to a new study from Deloitte and the Manufacturers Alliance for Productivity and Innovation (MAPI)

Concern and confusion over privacy and security of AR technology (Naked Security) A new study from ISACA has found consumers to be far more positive about the benefits of augmented reality (AR) than IT professionals. While 60% or more of consumers agree that a range of suggested AR applications would improve their life, only 21% of the thousands of business and technology professionals surveyed believe AR benefits outweigh the risks

While consumers remain complacent, hackers refine their skills (Help Net Security) A new Norton Cyber Security Insights Report found that consumers who were victims of cybercrime within the past year often continued their unsafe behavior. For example, while these consumers were more likely to use a password on every account, they were nearly twice as likely to share their password with others, negating their efforts

Marketplace

4 Common mistakes cyber startups make with new customers (Geektime) Cyber security is one of the fastest growing sectors, but comes with equally significant obstacles

Invincea Raises $10 Million in Strategic Growth Capital (BusinessWire) Led by ORIX Growth Capital and Comerica Bank, with New Atlantic Ventures, and Harbert Ventures participating, the additional capital will be used to accelerate Invincea’s growth as the company gains broad customer adoption with the industry’s highest performing next-generation antivirus security product

Uplevel Systems Raises $1.2M Funding to Launch New Managed Services Model to Small Business IT Consultants (Sys-Con Media) Hybrid service delivery equips consulting firms to remotely manage enterprise-class Wi-Fi, data security, storage, and VPNs via the cloud

AOL lays off 500 employees after adding 1,500 employees over the last 12 months (TechCrunch) AOL CEO Tim Armstrong just announced internally that there will be layoffs across AOL’s global workforce (AOL is TechCrunch’s parent company). The company will focus on mobile, video and data across two business units — media and platforms

Cylance Becomes First Technology Partner in NTT Security Cyber Security Innovation Programme with AI-based Advanced Endpoint Protection (ResponseSource) NTT Security, the global information security and risk management company, has today announced that it has chosen to work with next-generation endpoint security company Cylance on a joint go-to-market strategy

Intel Security looks to rally channel with "edgier" McAfee brand (Channel Life) McAfee is set to be reborn following recent announcements from Intel that it will spin off a majority ownership of its Intel Security Group (ISG) business unit to private investment firm TPG, creating an independent company - one that is far more edgier and with a fresh set of ideas, according to Technology Business Research

CACI Awarded Prime Position on $92 Million Multiple-Award Contract to Provide Operations Support to U.S. Space and Naval Warfare Systems Center Pacific (BusinessWire) Critical support for surveillance and reconnaissance operations that advance maritime dominance

Vencore to support Navy cyber efforts (C4ISRNET) Vencore has been awarded an $80 million Navy contract to support cyber efforts of Space and Naval Warfare Command Systems Center Pacific

Army plans industry day for R&D cyber defense acquisition (Washington Technology) The Army will host an industry day next month to discuss an upcoming contract for R&D related to defensive cyber operations

A10 Networks Extends its Salesforce CRM to the Channel with Impartner to Accelerate Indirect Revenue (PRNewswire) Global leader in application networking and security turns to Impartner's Partner Relationship Management solution to automate channel operations and drive channel growth

Cybereason Joins Coalition for Cybersecurity Policy & Law (PRWeb) Cybereason has joined the Coalition for Cybersecurity Policy & Law to take an active role in working with other public and private organizations to make cybersecurity policies more effective, ensuring a safer internet and making cybersecurity more robust for everyone

LookingGlass Ranked Number 90 Fastest Growing Company in North America on Deloitte’s 2016 Technology Fast 500™ (Yahoo!) LookingGlass Cyber Solutions™ today announced it ranked 90 on Deloitte’s Technology Fast 500™, a ranking of the 500 fastest growing technology companies in North America that are on the cutting edge and are transforming the way organizations do business

Wombat Security Technologies Ranked Number 144 Fastest Growing Company in North America on Deloitte's 2016 Technology Fast 500™ (PRNewswire) Attributes 602% revenue growth to a greater need for effective security training programs in a landscape where corporate breaches are a daily occurrence

Invincea Ranked Number 258th Fastest Growing Company in North America on Deloitte’s 2016 Technology Fast 500™ (BusinessWire) Two hundred and eighty-three percent revenue growth based on the success of X by Invincea machine learning next-gen antivirus security solution

VASCO Appoints Scott Clements as President and Chief Operating Officer (Econo Times) VASCO Data Security International, Inc. (NASDAQ:VDSI), a global leader in digital solutions including identity, security and business productivity, today announced that Scott Clements, currently VASCO’s EVP and Chief Strategy Officer, has been appointed President and Chief Operating Officer, effective immediately

HackerOne Appoints Former Zenefits CIO Justin Calmus To Accelerate Growth of the World's Largest Hacker Community (Broadway World) HackerOne, the leading bug bounty platform provider, today announced the appointment of Justin Calmus as Vice President of Hacker Success

Splunk Hires Salesforce.com Marketing Exec As Its New CMO (CRN) Splunk, the developer of operational and machine data management software, is building up its top executive ranks, hiring Saleforce.com marketing executive Brian Goldfarb as the company's new chief marketing officer and Richard Campione for the new post of chief product officer

Products, Services, and Solutions

Adobe To Pay $1 Million Compensation In Data Breach Case (Dark Reading) Personal data of more than 500,000 consumers from 15 states were stolen in the 2013 breach of Adobe server

NSS Labs Expands Research Offerings with new Virtual Firewall Test (Marketwired) Evaluation of virtual firewall vendors on security and management

NetWatcher Offers Complimentary Cyber Promiscuity Score (Broadway World) NetWatcher, a Managed Detection and Response Provider, today announced it is offering a free Cyber Promiscuity Score™ (CPS) as part of its easy to use enterprise-level, Cyber Threat Intelligence solution

Lastline Expands Effort to Defend Large Enterprises from Advanced Malware (Marketwired) Industry leading evasive malware solution improves detection, shared intelligence and scalability

Cloud Security Alliance Launches Crowdfunded Cloud Security Management Solution (Cloud Security Alliance) STARWatch SaaS application empowers organizations to manage compliance & risks using CSA Standards and Best Practices

Maritz Motivation Solutions Introduces New Tools To Prevent Fraud in Loyalty Programs (IT Business Net) Maritz Motivation Solutions announced that the company has introduced a new LoyaltyNext® Fraud Management Suite, an evolution in enabling marketers and brands to detect and prevent fraud in loyalty programs

Qualys Cloud Platform Receives FedRAMP Authority To Operate (Marketwired) Certified platform provides federal agencies continuous view of their security and compliance posture across global IT assets

Explain Vulnerability & Risk Metrics To Management (The Street) Sergeant Laboratories is excited to announce the launch of a new information series to highlight top issues present in the information security industry

Conosco partners with Webroot to provide enhanced cyber security protection and support for customers (PRNewswire) Webroot SecureAnywhere® Business Endpoint Protection to provide continuous threat protection with a minimal footprint

Malwarebytes Premium 3.0 announced (Ghacks) Malwarebytes, maker of the popular Anti-Malware application for Windows,released a first beta version of Malwarebytes Premium 3.0 for the operating system

IBM Built a Copy of the Internet for Mock Cyberattacks (PC Magazine) A new Massachusetts facility will help companies recover from attacks

eScan launches Total Security Suite and Internet Security Suite for Businesses, with PBAE technology to provide protection from ransomware (IT Web) eScan, one of the leading anti-virus and cyber security solution providers, now brings you its latest security solutions: eScan Total Security Suite for Business and eScan Internet Security Suite for Business for small to corporate segments. These products are designed and developed with thorough research and feedback from decision-makers across these business segments

Corero Combats Terabit DDoS Attacks With Terabit Scale Protection (Yahoo!) Corero Network Security (CNS.L), a leading provider of real-time security solutions against DDoS attacks, today has announced the ability to provide a Terabit of mitigation capacity with automatic DDoS defense technology at an unprecedented price point

Dropbox Strengthens Security Solutions With Expanded Symantec Partnership (BusinessWire) Dropbox grows security ecosystem to better protect enterprise customers

Technologies, Techniques, and Standards

NIST unveils Internet of Things cybersecurity guidance (Federal Times) As the number of devices connecting to the internet increases exponentially every day, cybersecurity experts have grown concerned about the varying degrees of digital protections each offer

NIST Special Publication 800-160 (Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems) (NIST) With the continuing frequency, intensity, and adverse consequences of cyber-attacks, disruptions, hazards, and other threats to federal, state, and local governments, the military, businesses, and the critical infrastructure, the need for trustworthy secure systems has never been more important to the long-term economic and national security interests of the United States

Soltra winds down; what does it mean for STIX/TAXII? (Eclectic iq) STIX/TAXII standards have become “HTML of Cyber Security” and enable widespread, simple and low-cost information sharing for global enterprises across industries. EclecticIQ, top provider of STIX/TAXII-compliant Threat Intelligence Platform, commends Soltra for protecting industry as early adopter

The Army's cyber ops has a data problem (Federal Times) The Army’s cyber operations are challenged by the amount of data flowing through the network, according to the service’s cyber director in the Army’s G-3/5/7 branch

Design and Innovation

Security experts divided on ethics of Facebook's password purchases (CSO) Last week, Facebook CSO Alex Stamos told conference attendees in Lisbon that the company buys stolen passwords on the black market

Human drivers will bully robot cars, says CEO of Mercedes-Benz USA (Los Angeles Times) Dietmar Exler, chief executive of Mercedes-Benz USA, is often asked why it's taking so long to develop self-driving cars

Former Cisco Systems executive warns auto industry about narrow thinking (Los Angeles Times) Over decades at Motorola and Cisco Systems, Padmasree Warrior saw how mobile phones and networking equipment became more powerful and feature-rich through software advances

Cyber security will ‘forever be a moving target’ (Automotive World) The threat of hacking may always be present in the automotive industry, writes Michael Nash

Business needs AI defence against AI attacks, says Darktrace (Computer Weekly) Cyber attackers are turning to machine learning to create smarter attacks and defenders will require similar technology to detect them, warns Darktrace

Here's how quantum cryptography will make online shopping truly secure (TechCrunch) Data security has become a chief concern for retailers and banks that need to protect their customers against the growing threat of cybercrime, the costs of which hurt businesses to the tune of $400 billion each year

Legislation, Policy, and Regulation

'Snoopers’ Charter' Set To Become Law In UK (Dark Reading) Surveillance bill goes through British Parliament and awaits only the Royal assent to become law before the year ends

Snoopers’ Charter Passes Lords Test (Infosecurity Magazine) The House of Lords has passed the controversial Investigatory Powers Bill or Snoopers’ Charter and very soon the legislation will enshrine in law for the first time the mass surveillance of the populace by the security services

The US–China Cybersecurity Disconnect (Modern War Institute) The relationship between China and cybersecurity is difficult to unpack, mainly because it does not fit traditional interpretations of how a state regulates operations in other, non-cyber domains. Beijing is the subject of significant criticism about cyber threats that originate within China. The United States government has struggled to respond to China’s cybersecurity posture, but the disconnect between the United States and China is exacerbated by two significant differences

America’s Top Spy Talks Snowden Leaks and Our Ominous Future (Wired) Public appearances don’t come easily to James Clapper, the United States director of national intelligence

Hacked by a teenager or foreign spy? FireEye CEO urges governments to attribute state cyber attacks (Computer Business Review) If governments know a state actor is responsible, FireEye CEO Kevin Mandia believes that they should say so

Big Change Coming to Government Hacking Powers (Digital Guardian) In two weeks, the federal government will gain significant new authority to perform remote searches of devices anywhere in the country, with a single warrant. The new power will go into effect on Dec. 1, and though Congress has the ability to prevent that from happening, it’s looking less and less likely that they will

Trump Cyber Security Team and Policy Slow to Take Shape (Fortune) The U.S. could become more vulnerable to threats

FCC abides by GOP request, deletes everything from meeting agenda (Ars Technica) FCC chair takes all rulemakings off agenda one day after GOP lawmakers' request

DIUx Should Continue Reporting to Pentagon Chief in Trump Administration, Director Says (Federal Times) Over the last year, the Defense Innovation Unit Experimental (DIUx) office has been at the core of Secretary of Defense Ash Carter’s push for greater innovation inside the Pentagon — so much so that Carter has the unit reporting directly to his office to bypass the typical department bureaucracy and ensure its success

Cybercom Commander: Public-Private Partnerships Needed for Cybersecurity (DoD News) The public-private cybersecurity partnership between private companies and U.S. Cyber Command and other federal agencies has been uneven so far despite some fledgling success, but collaboration is critical given growing threats to everyone from cyberspace, the commander of U.S. Cyber Command said here yesterday

Are data sets the new critical infrastructure? (Federal Times) Philip Quade of the National Security Agency's Cyber Task Force discusses what information should be protected by the Department of Homeland Security as a critical infrastructure

Army's cyber electromagnetic cells highlight need to get operational policy right (Federal Times) The Army stood up cyber electromagnetic activity cells that can — by way of challenging capabilities integration work — operate effectively at the tactical level, the cyber director in the Army’s G-3/5/7 division said. Among the key challenges, however, is working through some of the bureaucratic hurdles

Army Cyber to break ground on Fort Gordon headquarters (US Army) In a ceremony to be held here Nov. 29, Secretary of the Army Eric Fanning will join Army Cyber Command and Second Army commander Lt. Gen. Paul M. Nakasone to break ground on construction for a new Army Cyber headquarters facility that will draw together the Army's Cyber operations, capability development, training, and education in one location

Litigation, Investigation, and Law Enforcement

Regulator talks to telcos after Aussies' info found for sale online (CSO) Fairfax Media had reported the data was up for sale by an Indian security firm

ISPs ordered to block LinkedIn in Russia (CSO) Russia's telecommunications regulator has ordered LinkedIn be blocked following a court ruling that it breached Russian privacy law

Antivirus Vendors Are Watching Kaspersky, Microsoft Battle Closely (CRN) As Moscow-based Kaspersky Lab looks to take on Microsoft for alleged antitrust violations, some other antivirus vendors say they are watching the situation closely to see if they also need to step in

Court Ruling in Palantir-Army Clash Leaves Much In Question (Defense News) The US Court of Federal Claim’s 104-page opinion in the Palantir lawsuit against the US Army sends the service back to do a more thorough analysis of commercially available options for its intelligence analysis framework, but it does not define exactly how the Army should conduct the analysis or what would be considered a satisfactory level of market research

Facebook and WhatsApp - Part II (Wapack Labs) In the United Kingdom, Facebook is once again being prevented from sharing data with their subsidiary WhatsApp

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Versus16 (San Francisco, California, USA, November 17, 2016) Versus is not an ordinary event. Versus is not about pitching products or preaching to the choir. Versus is about challenging what you think you know about cybersecurity, about technology, about doing...

Israel HLS and Cyber 2016 (Tel Aviv, Israel, November 14 - 17, 2016) Where physical and cyber security meet. Topics include intelligence, cyber crime, and counter-terrorism, defending critical infrastructures, a smart global world, mass events--the integrative approach,...

SANS Healthcare CyberSecurity Summit & Training 2016 (Houston, Texas, USA, November 14 - 21, 2016) SANS will be hosting its 4th Annual Healthcare Cybersecurity Summit. Join us and hear top security experts from leading healthcare companies discuss proven approaches for securing and succeeding in the...

Versus 16 (San Francisco, California, USA, November 17, 2016) Versus is not an ordinary event. Versus is not about pitching products or preaching to the choir. Versus is about challenging what you think you know about cybersecurity, about technology, about doing...

Focusing On The Future: Prioritizing Security in the Digital Economy (Washington, DC, USA, November 18, 2016) In today's digital economy, developing and prioritizing a cyber strategy is critical to address diverse and evolving threats, foster trust in the technology we use, and define a path forward where security...

Data Breach & Fraud Prevention Summit Asia (Mumbai, India, June 8, 2016) ISMG’s Data Breach & Fraud Prevention Summit Asia – Mumbai is a one-day event that will focus on the latest fraud techniques and technologies, as well as a holistic, strategic approach to looking at the ...

SCSC Cyber Security Conclave 2.0 Conference and Exhibition (Hyderabad, India, November 22 - 23, 2016) India’s leading two-day cyber security event is returning in November 2016, once again bringing together over hundreds of cyber security experts, senior officials and policy-makers from across the public...

4th Ethiopia Banking & ICT Summit (Addis Ababa, Ethiopia, November 25, 2016) The 4th Ethiopia Banking & ICT Summit is the ONLY event in Horn of Africa that focuses on technology innovations and trends in the Banking and ICT sectors. This annual summit brings together Financial...

Insider Threat Program Development Training For NISPOM CC 2 (Aberdeen, Maryland, USA, August 10 - 11, 2016) Insider Threat Defense will hold a two-day training class on Insider Threat Program Development (National Insider Threat Policy-NISPOM Conforming Change 2). For a limited time the training is being offered...

Internet of Things (IoT) (Elkridge, Maryland, USA, November 29, 2016) This cybergamut Technical Tuesday features Dr. Susan Cole, currently the Cybersecurity Lead for a Federal Information Systems Controls Audit Management (FISCAM) preparation team and also provides consulting...

CIFI Security Summit (Toronto, Ontario, Canada, November 30 - December 1, 2016) The Annual CIFI Security Summit takes place all over the world, Asia, Europe, Australia & North America. These summits are essential 2 day conferences and exhibitions bringing together leading security...

AlienVault USM Webcast (Online, December 1, 2016) Host-based intrusion detection systems (HIDS), work by monitoring activity that is occurring internally on a host. HIDS look for unusual or nefarious activity by examining logs created by the operating...

Cyber Threats Master Class (Turin, Italy, December 1 - 2, 2016) The UNICRI Masterclass on Cyber Threats aims to provide media and public relations professionals, as well as those planning a career in public information and communication, with a deeper understanding...

Disrupt London (London, England, UK, December 3 - 6, 2016) TechCrunch Disrupt is the world’s leading authority in debuting revolutionary startups, introducing game-changing technologies, and discussing what’s top of mind for the tech industry’s key innovators.

US Department of Commerce Cyber Security Trade Mission to Turkey ( Ankara and Istanbul, Turkey, December 5 - 8, 2016) Now is the time to expand in Turkey! The growth and frequency of cyber-attacks in recent years has increased the demand to protect critical data and infrastructure of governments and businesses. Turkey...

NCCoE Speaker Series: Understanding, Detecting & Mitigating Insider Threats (Rockville, Maryland, USA, December 6, 2016) Insider threats are growing at an alarming rate, with medium-to-large company losses averaging over $4 million every year. Smaller businesses are at risk too, and it is estimated that in 2014, over half...

Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter (Elkridge, Maryland, USA, December 6, 2016) This cybergamut Technical Tuesday features ZeroFox data scientist John Seymour, who will present a recurrent neural network that learns to tweet phishing posts targeting specific users. Historically, machine...

Practical Privacy Series 2016 (Washingto, DC, USA, December 7 - 8, 2016) This year, the Practical Privacy Series will return to Washington, DC, with its rapid, intensive education that arms you with the knowledge you need to excel on the job. We’re programming some stunningly...

CISO Southern Cal (Los Angeles, California, USA, December 8, 2016) A data breach is not only a PR nightmare, but cause for customers to turn to competitors, exposing sensitive company information and racking up fines from industry regulators. In order for organizations...

SANS Cyber Defense Initiative 2016 (Washington, DC, USA , December 10 - 17, 2016) Make plans to attend SANS Cyber Defense Initiative 2016 (CDI). SANS is the one educational organization known for developing the cybersecurity skills most in need right now. SANS Cyber Defense Initiative...

Privacy, Security and Trust: 14th Annual Conference (Auckland, New Zealand, December 12 - 14, 2016) This year’s international conference focuses on the three themes of Privacy, Security and Trust. It will provide a forum for global researchers to unveil their latest work in these areas and to show how...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.